Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol

09/09/2019
by   Xinyu Li, et al.
0

Proof-of-stake (PoS) blockchain protocols are emerging as one of the most promising alternatives to the energy-consuming proof-of-work protocols. However, one particularly critical threat in the PoS setting is the well-known long-range attacks caused by secret key leakage (LRSL attack). Specifically, an adversary can attempt to compromise accounts possessing substantial stake at some past moment such that alter the chain history, violating the fundamental persistence property. Puncturable signatures, introduced by Bellare et al. (Eurocrypt'16), provide a satisfying solution to construct practical proof-of-stake blockchain resilient to the LRSL attack. In this paper, we provide an in-depth study of puncturable signatures and explore its applications in the proof-of-stake blockchain. We formalize a security model that allows the adversary for adaptive signing and puncturing queries, and show a construction with efficient puncturing operations based on the Bloom filter data structure and strong Diffie-Hellman assumption. Finally, we use the puncturable signatures to construct practical proof-of-stake blockchain protocols to resist the LRSL attack, while previously the forward-secure signature (FS) is used to immunize this attack. We implement our scheme and provide experimental results showing that in comparison with FS our construction performs substantially better on signature size, signing and verification efficiency, significantly on key update efficiency.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset